With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring
Best practices for creating your disaster recovery plans
Thanks to a variety of regulations, businesses must retain e-mail and instant messages, creating an information glut. Here’s how to manage it.
Watching inbound and outbound Web applications communications for signs of attack
A forensic readiness program helps a company protect its assets and know when they’ve been compromised.
Securing access in the post-mainframe world
Users hate passwords, and it shows.
Increased attacks are driven by money and modularity.
Given the incredibly small window afforded IT managers for patching vulnerable systems, security experts recommend getting help in categorizing vulnerabilities as well as in determining which are actually present.
Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.
A neutral, third-party testing organization rates IPS performance, accuracy, and reliability.
ISO 17799, the world’s most-used information security framework, gets updated.
Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.
Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail
The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.
An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing
It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.
How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?
Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.
Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.